Python is pre-loaded on all OSes, save any Windows, and you can effortlessly deal with that by compiling to an executable, a portion on which would greatly benefit this tutorial.
So it's not like it has to be installed separately in any case.

And you'd be masking the keylogger somehow anyway, wouldn't you? Either that, or you're otherwise activating it without the targets knowledge, as if you had physical access to the system.

So it doesn't matter that it's an IL, just obfuscate the malicious portion, or embed it in something.
Or just do what the tutorial says. You overestimate the average mark, friend.